CSU-Carig

LRC WEB OPAC

Your Gateway to Our Library Collection

RedEagle Search

Cyber security for next-generation computing technologies / Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz. (Record no. 20442)

000 -LEADER
fixed length control field 03917nam a22002297a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781032519005 (ebk)
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number C994 2024
245 ## - TITLE STATEMENT
Title Cyber security for next-generation computing technologies / Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz.
250 ## - EDITION STATEMENT
Edition statement First edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton, FL :
Name of publisher CRC Press,
Year of publication ©2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource, xiii, 313 pages ;
Other physical details illustrations.
500 ## - GENERAL NOTE
General note Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Cyber security : future trends & solutions / Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, Gowhar Mohi ud din Dar -- Security & intelligent management : survey / Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, Muhammad Allah Rakha -- Comparative analysis of machine and deep learning for cyber security / Hafsa Maryam, Syeda Zillay Nain Zukhraf, Rehmat Ullah -- AI-based secure wireless communication technologies & cyber threats for IoT networks / Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, Salma El Hajjami -- Cyber threat actors review : examining the tactics and motivations of adversaries in the cyber landscape / Zakaria Abou El Houda -- Layer-based security threats in IoT networks / Muna Muhammad, Ahthasham Sajid, Hira Arshad -- Intrusion detection system using AI and machine learning algorithm / Muhammad Tehmasib Ali Tashfeen -- Signature-based intrusion detection system for IoT / Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, Muhammad Fayaz -- Hybrid model for IoT enabled intelligent towns using MQTT-IoT-IDS2020 dataset / Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Muhammad Yaseen Ayub -- Cyber security for edge fog computing applications / Hanane Lamaazi -- Cyber attacks against intelligent transportation systems / Muhammad Usama, Ubaid Ullah, Ahthasham Sajid -- Intelligent transportation systems for IoT-based UAV-networks / Mamoona Jamil, Usman Haider, Inam Ullah Khan, Tarandeep Kaur Bhatia -- Cyber attack detection analysis using machine learning for IoT based UAV network / Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub, Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, Inam Ullah Khan -- Blockchain solutions for cyber criminals / Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, Bhupendra Kumar Soni -- Blockchain security measures to combat cybercrime / Rahmeh Ibrahim, Qasem Abu Al-Haija -- AI classification algorithms for human activities recognition system with cyber security perspective / Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman khan, Inam Ullah Khan.
520 ## - SUMMARY, ETC.
Summary, etc "This book sheds light on the cybersecurity challenges associated with next generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cybersecurity forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. The book aims to cover key topics related to cybersecurity in next generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes"-- Provided by publisher.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Khan, Inam Ullah, editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Ouaissa, Mariya, editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Ouaissa, Mariyam, editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Abou El Houda, Zakaria, editor.
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Ijaz, Muhammad Fazal, editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Electronic Books
Holdings
Source of acquisition Permanent Location Date acquired Collection code Koha item type Lost status Shelving location Withdrawn status Current Location Full call number
DonationCagayan State University - Carig Library2025-05-17E-BooksElectronic Books E-Resource Section Cagayan State University - Carig Library005.8 C994 2024

Cagayan State University University Library, Carig Campus
Tuguegarao City, Cagayan 3500 | www.csucarig.edu.ph

Powered by Koha